Edit Content

Secure Your IT Career

 Master the fundamentals of cybersecurity and prepare for the CompTIA Security+ certification exam. 

Course Overview

CompTIA Security+ (SY0-701) CertPREP Course

The CompTIA Security+ (SY0-701) CertPREP Course offers a comprehensive approach to mastering essential security concepts, controls, and cryptographic solutions. Divided into six major parts, the course covers general security concepts, threats and vulnerabilities, security architecture, operations, program management, and final preparation tasks. Through a blend of detailed lessons, exam preparation tasks, and hands-on labs, learners will build a strong foundation in cybersecurity. Whether it’s understanding cryptography, threat actors, or mitigating enterprise risks, this course provides the necessary tools to pass the Security+ certification exam and enhance career prospects in the field of IT security.

What you'll learn

By the end of this course, participants will:
  • Understand fundamental security principles and concepts
  • Identify and address security risks, vulnerabilities, and threats
  • Implement cryptographic solutions for securing data
  • Manage and configure security architecture and operations
  • Prepare for the CompTIA Security+ certification exam

Course Details

Course Outline

Part I: General Security Concepts
  • Introduction (10 Questions)
  • Control Categories
  • Control Types
  • Exam Preparation Tasks (10 Questions)
  • Labs
  • Introduction (10 Questions)
  • Confidentiality, Integrity, and Availability (CIA)
  • Non-repudiation
  • Authentication, Authorization, and Accounting (AAA)
  • Gap Analysis
  • Zero Trust
  • Physical Security
  • Deception and Disruption Technology
  • Exam Preparation Tasks (10 Questions)
  • Labs
  • Introduction (10 Questions)
  • Business Processes Impacting Security Operations
  • Technical Implications
  • Documentation
  • Version Control
  • Exam Preparation Tasks (10 Questions)
  • Introduction (17 Questions)
  • Public Key Infrastructure (PKI)
  • Encryption
  • Transport/Communication
  • Symmetric Versus Asymmetric Encryption
  • Key Exchange
  • Algorithms
  • Key Length
  • Tools
  • Trusted Platform Module
  • Hardware Security Module
  • Key Management System
  • Secure Enclave
  • Obfuscation
  • Steganography
  • Hashing
  • Salting
  • Digital Signatures
  • Key Stretching
  • Blockchain
  • Open Public Ledger
  • Certificates
  • Exam Preparation Tasks (10 Questions)
  • Labs
Part II: Threats, Vulnerabilities, and Mitigations
  • Introduction (10 Questions)
  • Threat Actors
  • Attributes of Actors
  • Motivations
  • War
  • Exam Preparation Tasks (10 Questions)
  • Introduction (10 Questions)
  • Message-Based
  • Image-Based
  • File-Based
  • Voice Call
  • Removable Device
  • Vulnerable Software
  • Unsupported Systems and Applications
  • Unsecure Networks
  • Open Service Ports
  • Default Credentials
  • Supply Chain
  • Human Vectors/Social Engineering
  • Exam Preparation Tasks (10 Questions)
  • Labs (1 Question)
  • Introduction (10 Questions)
  • Application
  • Operating System (OS)-Based
  • Web-Based
  • Hardware Security Module
  • Virtualization
  • Cloud Specific
  • Supply Chain
  • Cryptographic
  • Misconfiguration
  • Mobile Device
  • Zero-Day Vulnerabilities
  • Exam Preparation Tasks (10 Questions)
  • Labs (1 Question)
  • Introduction (9 Questions)
  • Malware Attacks
  • Physical Attacks
  • Network Attacks
  • Application Attacks
  • Cryptographic Attacks
  • Password Attacks
  • Indicators
  • Exam Preparation Tasks (8 Questions)
  • Labs (1 Question)
  • Introduction (13 Questions)
  • Segmentation
  • Access Control
  • Isolation
  • Patching
  • Encryption
  • Monitoring
  • Least Privilege
  • Configuration Enforcement
  • Decommissioning
  • Hardening Techniques
  • Exam Preparation Tasks (6 Questions)
  • Labs (1 Question)
Part III: Security Architecture
  • Introduction (9 Questions)
  • Architecture and Infrastructure Concepts
  • Considerations
  • Exam Preparation Tasks (6 Questions)
  • Introduction (9 Questions)
  • Infrastructure Considerations
  • Secure Communication/Access
  • Selection of Effective Controls
  • Exam Preparation Tasks (9 Questions)
  • Labs
  • Introduction (10 Questions)
  • Data Types
  • Data Classifications
  • General Data Considerations
  • Methods to Secure Data
  • Exam Preparation Tasks (10 Questions)
  • Introduction (10 Questions)
  • High Availability
  • Site Considerations
  • Platform Diversity
  • Multi-Cloud System
  • Continuity of Operations
  • Capacity Planning
  • Testing
  • Backups
  • Power
  • Exam Preparation Tasks (5 Questions)
Part IV: Security Operations
  • Introduction (10 Questions)
  • Secure Baselines
  • Hardening Targets
  • Wireless Devices
  • Mobile Solutions
  • Connection Methods
  • Wireless Security Settings
  • Application Security
  • Sandboxing
  • Monitoring
  • Exam Preparation Tasks (8 Questions)
  • Introduction (6 Questions)
  • Acquisition/Procurement Process
  • Assignment/Accounting
  • Monitoring/Asset Tracking
  • Disposal/Decommissioning
  • Exam Preparation Tasks (4 Questions)
  • Introduction (10 Questions)
  • Identification Methods
  • Analysis
  • Vulnerability Response and Remediation
  • Validation of Remediation
  • Reporting
  • Exam Preparation Tasks (6 Questions)
  • Labs (1 Question)
  • Introduction (6 Questions)
  • Monitoring and Computing Resources
  • Activities
  • Tools
  • Exam Preparation Tasks (5 Questions)
  • Introduction (12 Questions)
  • Firewall
  • IDS/IPS
  • Web Filter
  • Operating System Security
  • Implementation of Secure Protocols
  • DNS Filtering
  • Email Security
  • File Integrity Monitoring
  • DLP
  • Network Access Control (NAC)
  • Endpoint Detection and Response (EDR)/Extended Detection and Response (XDR)
  • User Behavior Analytics
  • Exam Preparation Tasks (6 Questions)
  • Labs
Part V: Security Program Management and Oversight
  • Introduction (12 Questions)
  • Provisioning/De-provisioning User Accounts
  • Permission Assignments and Implications
  • Identity Proofing
  • Federation
  • Single Sign-On (SSO)
  • Interoperability
  • Attestation
  • Access Controls
  • Multifactor Authentication (MFA)
  • Password Concepts
  • Privileged Access Management Tools
  • Exam Preparation Tasks (6 Questions)
  • Labs
  • Introduction (10 Questions)
  • Use Cases of Automation and Scripting
  • Benefits
  • Other Considerations
  • Exam Preparation Tasks (6 Questions)
  • Introduction (10 Questions)
  • Process
  • Training
  • Testing
  • Root Cause Analysis
  • Threat Hunting
  • Digital Forensics
  • Exam Preparation Tasks (6 Questions)
  • Labs
  • Introduction (7 Questions)
  • Log Data
  • Data Sources
  • Exam Preparation Tasks (6 Questions)
  • Labs
Part VI: Final Preparation
  • Introduction (8 Questions)
  • Guidelines
  • Policies
  • Standards
  • Procedures
  • External Considerations
  • Monitoring and Revision
  • Types of Governance Structures
  • Roles and Responsibilities for Systems and Data
  • Exam Preparation Tasks (6 Questions)
  • Introduction (10 Questions)
  • Risk Identification
  • Risk Assessment
  • Risk Analysis
  • Risk Register
  • Risk Tolerance
  • Risk Appetite
  • Risk Management Strategies
  • Risk Reporting
  • Business Impact Analysis
  • Exam Preparation Tasks (6 Questions
  • Introduction (7 Questions)
  • Vendor Assessment
  • Agreement Types
  • Vendor Monitoring
  • Questionnaires
  • Rules of Engagement
  • Exam Preparation Tasks (6 Questions)
  • Introduction (10 Questions)
  • Compliance Reporting
  • Consequences of Non-compliance
  • Compliance Monitoring
  • Attestation and Acknowledgment
  • Privacy
  • Exam Preparation Tasks (6 Questions)
  • Introduction (7 Questions)
  • Attestation
  • Internal
  • External
  • Penetration Testing
  • Exam Preparation Tasks (4 Questions)
  • Introduction (6 Questions)
  • Phishing
  • Anomalous Behavior Recognition
  • User Guidance and Training
  • Reporting and Monitoring
  • Development
  • Execution
  • Exam Preparation Tasks (4 Questions)
  •  Assessment Type: Practice tests, quizzes, and interactive knowledge checks
  • Certification: Completion badge for prep class (not the official CompTIA certification)
By enrolling in this course, participants will;
  • Covers key security topics like cryptography and risk management
  • Includes practical labs and exam prep tasks
  • Prepares you for the CompTIA Security+ (SY0-701) certification exam
  • Self-paced learning for flexible study
  • Ideal for IT professionals looking to enhance security skills
  • Completion badge to validate your knowledge
Course Features
Why Enroll at Speedlink?

Your Path to Tech Success Begins at Speedlink

Join thousands of students in United States and beyond who trust us to gain real-world tech skills, industry-recognized certifications, and career-boosting expertise. Whether you’re starting out or leveling up, our hands-on training, expert instructors, and job-ready curriculum will get you there faster.

Course Enquiry

Want to know more about this course? Fill out the form below, and we’ll get back to you with all the info you need — pricing, certification, how to join, or anything else you’re curious about.

Shopping Cart
Scroll to Top